SUSE update for bind



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-25220
CWE-ID CWE-350
Exploitation vector Network
Public exploit N/A
Vulnerable software
SUSE Linux Enterprise Server
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Basesystem
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Server Applications
Operating systems & Components / Operating system

python3-bind
Operating systems & Components / Operating system package or component

bind-utils-debuginfo
Operating systems & Components / Operating system package or component

bind-utils
Operating systems & Components / Operating system package or component

libns1604-debuginfo
Operating systems & Components / Operating system package or component

libns1604
Operating systems & Components / Operating system package or component

libisccfg1600-debuginfo
Operating systems & Components / Operating system package or component

libisccfg1600
Operating systems & Components / Operating system package or component

libisccc1600-debuginfo
Operating systems & Components / Operating system package or component

libisccc1600
Operating systems & Components / Operating system package or component

libisc1606-debuginfo
Operating systems & Components / Operating system package or component

libisc1606
Operating systems & Components / Operating system package or component

libirs1601-debuginfo
Operating systems & Components / Operating system package or component

libirs1601
Operating systems & Components / Operating system package or component

libirs-devel
Operating systems & Components / Operating system package or component

libdns1605-debuginfo
Operating systems & Components / Operating system package or component

libdns1605
Operating systems & Components / Operating system package or component

libbind9-1600-debuginfo
Operating systems & Components / Operating system package or component

libbind9-1600
Operating systems & Components / Operating system package or component

bind-devel
Operating systems & Components / Operating system package or component

bind-doc
Operating systems & Components / Operating system package or component

bind-debugsource
Operating systems & Components / Operating system package or component

bind-debuginfo
Operating systems & Components / Operating system package or component

bind
Operating systems & Components / Operating system package or component

bind-chrootenv
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Reliance on Reverse DNS Resolution for a Security-Critical Action

EUVDB-ID: #VU61422

Risk: Medium

CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-25220

CWE-ID: CWE-350 - Reliance on Reverse DNS Resolution for a Security-Critical Action

Exploit availability: No

Description

The vulnerability allows a remote attacker to poison DNS cache.

The vulnerability exists due to an error in DNS forwarder implementation. When using forwarders, bogus NS records supplied by, or via, those forwarders may be cached and used by named if it needs to recurse for any reason, causing it to obtain and pass on potentially incorrect answers. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.


Mitigation

Update the affected package bind to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server: 15-SP3-LTSS - 15-SP4

SUSE Linux Enterprise High Performance Computing: 15-SP3-LTSS - 15-SP4

SUSE Linux Enterprise Module for Basesystem: 15-SP3 - 15-SP4

SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4

SUSE Manager Server: 4.2

SUSE Manager Proxy: 4.2

SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4

SUSE Linux Enterprise Module for Server Applications: 15-SP3 - 15-SP4

python3-bind: before 9.16.6-150300.22.16.1

bind-utils-debuginfo: before 9.16.6-150300.22.16.1

bind-utils: before 9.16.6-150300.22.16.1

libns1604-debuginfo: before 9.16.6-150300.22.16.1

libns1604: before 9.16.6-150300.22.16.1

libisccfg1600-debuginfo: before 9.16.6-150300.22.16.1

libisccfg1600: before 9.16.6-150300.22.16.1

libisccc1600-debuginfo: before 9.16.6-150300.22.16.1

libisccc1600: before 9.16.6-150300.22.16.1

libisc1606-debuginfo: before 9.16.6-150300.22.16.1

libisc1606: before 9.16.6-150300.22.16.1

libirs1601-debuginfo: before 9.16.6-150300.22.16.1

libirs1601: before 9.16.6-150300.22.16.1

libirs-devel: before 9.16.6-150300.22.16.1

libdns1605-debuginfo: before 9.16.6-150300.22.16.1

libdns1605: before 9.16.6-150300.22.16.1

libbind9-1600-debuginfo: before 9.16.6-150300.22.16.1

libbind9-1600: before 9.16.6-150300.22.16.1

bind-devel: before 9.16.6-150300.22.16.1

bind-doc: before 9.16.6-150300.22.16.1

bind-debugsource: before 9.16.6-150300.22.16.1

bind-debuginfo: before 9.16.6-150300.22.16.1

bind: before 9.16.6-150300.22.16.1

bind-chrootenv: before 9.16.6-150300.22.16.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2022/suse-su-20220945-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###